Research Article

The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security

Table 1

LSTM-AutoEncoder code architecture diagram.

Inputs = input (shape = (train_data.shape [1]), train_data.shape [2])

# ENCODER
L1 = LSTM (64, activations = relu) (inputs)
L2 = RepeatVector (train_data.shape [1]) (L1)
# DECODER
L3 = LSTM (64, activations = relu, return_sequences = True) (L2)
Outputs = TimeDistributed (dense (train_data.shape [2])) (L3)
LSTM-AE = Model (inputs = inputs, outputs = outputs)
Inputs = input (shape= (train_data.shape [1]), train_data.shape [2])
# ENCODER
L1 = LSTM (64, activations = relu) (inputs)